> That arpwatch notice just shows that there was a packet from an IP address
> that hadn't been seen before. What makes you think it's a spoofing attempt?

The newly advertised IP used the same mac as the default gateway.

> Something like this might be seen if e.g. a new IP address was added on the
> default gateway router.

This would be the most "comforting" rationale though I would expect my hosting 
provider to be more forthcoming about an infrastructure change. 

Additionally, traffic was observed via TCP80 and TCP443 testing the 
configuration of HTTP and TLS protocols. Leading me to believe the IP was not 
benign.

> A tcpdump from the same time that the arpwatch notice was triggered might give
> a clearer picture. Without knowing more about the network config I couldn't
> say for sure, but it's quite possible that the hosting provider does protect
> against arp shenanigans.

Agreed that tcpdump would be useful though I would expect arpwatch to be just 
as reliable. 

I have no doubt my hosting provider has certain protections in place. I've been 
a customer for a number of months with this being the first alert.

Thanks,
Paul

Reply via email to